Backdoor.Win32.Farfli_c02f0327c1
Trojan.Win32.Patched.md (Kaspersky), Virus.Win32.Ramnit.a!dam (v) (VIPRE), Virus.Win32.Zbot!IK (Emsisoft), Backdoor.Win32.Farfli.FD, PackedMysticCompressor.YR (Lavasoft MAS)
Behaviour: Trojan, Backdoor, Virus, Packed
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
MD5: c02f0327c1b5c8c5c1f04b35c6cf77bc
SHA1: 901890b97450e5db69e47781dc9dc8207c9ded1a
SHA256: a653c143ead7fbe48b373b4089d1a6fc7a8fdbc3a01d553662188240f92f9cf0
SSDeep: 3072:c34d2ECsZLqgMORHs1ZKjmQ7LjYT S2r87FxS0jLsaUDq:aNHFOtMKjfjYT SO85xSssaQq
Size: 125402 bytes
File type: PE32
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: Jottix
Created at: 2008-12-20 18:44:25
Summary:
Backdoor. Malware that enables a remote control of victim's machine.
Payload
No specific payload has been found.
Process activity
The Backdoor creates the following process(es):
c02f0327c1b5c8c5c1f04b35c6cf77bcmgr.exe:2756
c02f0327c1b5c8c5c1f04b35c6cf77bc.exe:2588
ajvmmkjkbtsibwto.exe:1792
ctfmon.exe:252
The Backdoor injects its code into the following process(es):
winupdate86.exe:2800
File activity
The process c02f0327c1b5c8c5c1f04b35c6cf77bcmgr.exe:2756 makes changes in a file system.
The Backdoor creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\ajvmmkjkbtsibwto.exe (601 bytes)
The process winupdate86.exe:2800 makes changes in a file system.
The Backdoor creates and/or writes to the following file(s):
%System%\config\software (5764 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%System%\winupdate86mgr.exe (103 bytes)
%System%\winlogon86.exe (601 bytes)
%System%\config\software.LOG (9152 bytes)
The Backdoor deletes the following file(s):
%System%\winupdate86.exe (0 bytes)
The process c02f0327c1b5c8c5c1f04b35c6cf77bc.exe:2588 makes changes in a file system.
The Backdoor creates and/or writes to the following file(s):
%System%\config\software (5226 bytes)
%System%\config\software.LOG (10144 bytes)
%System%\winlogon86.exe (601 bytes)
%System%\winupdate86.exe (601 bytes)
The process ajvmmkjkbtsibwto.exe:1792 makes changes in a file system.
The Backdoor creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\psyykfdm.sys (15 bytes)
The Backdoor deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\psyykfdm.sys (0 bytes)
Registry activity
The process c02f0327c1b5c8c5c1f04b35c6cf77bcmgr.exe:2756 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "4B F5 AC 1E 6F 1A 52 9D 45 A1 EB 19 61 A6 ED 82"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fdd9f6f3-7454-11e2-b4cd-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{773a730e-74fb-11e2-b597-000c293bdf2f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp]
"ajvmmkjkbtsibwto.exe" = "Common File Format Explorer"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fdd9f6f2-7454-11e2-b4cd-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fdd9f6f5-7454-11e2-b4cd-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The Backdoor modifies IE settings for security zones to map all web-nodes that bypassing proxy to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass" = "1"
The Backdoor modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Backdoor modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The process winupdate86.exe:2800 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "64 3B 43 16 38 69 77 2D F9 D5 95 5F 18 63 06 A8"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit" = "%System%\winlogon86.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 40 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software]
"8636065b-fef0-4255-b14f-54639f7900a4" = "8636065b-fef0-4255-b14f-54639f7900a4"
The Backdoor modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Backdoor modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Backdoor modifies IE settings for security zones to map all web-nodes that bypassing proxy to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
To automatically run itself each time Windows is booted, the Backdoor adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"winupdate86.exe" = "%System%\winupdate86.exe"
The Backdoor deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyOverride"
The process c02f0327c1b5c8c5c1f04b35c6cf77bc.exe:2588 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"Userinit" = "%System%\winlogon86.exe"
To automatically run itself each time Windows is booted, the Backdoor adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"winupdate86.exe" = "%System%\winupdate86.exe"
The process ajvmmkjkbtsibwto.exe:1792 makes changes in a system registry.
The Backdoor creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "64 07 83 CD DE C9 17 06 EA 5B 68 A5 C3 B4 FE 70"
The process ctfmon.exe:252 makes changes in a system registry.
The Backdoor deletes the following value(s) in system registry:
The Backdoor disables automatic startup of the application by deleting the following autorun value:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"internat.exe"
Network activity (URLs)
| URL | IP |
|---|---|
| baywsfsemlttpsj.com | |
| celnjqtqkgxsccabmj.com | |
| kbchmynenfcuktfxa.com | |
| xablgjgqpfayxcoan.com | |
| gwqqcthftcngyt.com | |
| roukwtmdvelyea.com | |
| mevofemqreinlirk.com | |
| ksdrwalv.com | |
| irgpjqkcojxabjs.com | |
| vusiqdyp.com | |
| guvdavhwoylcb.com | |
| iwtkdxsmu.com | |
| qtlmbubna.com | |
| uxasdaxjiqrk.com | |
| aalhoqwtompx.com | |
| jdonpdfvw.com | |
| qisgxhcl.com | |
| vyhxatulmuaxvexjv.com | |
| psnylopyt.com | |
| wwwlridhcphwak.com | |
| bxqvcimgcaepkubgi.com | |
| oijkhgcahdwyixo.com | |
| hwgcksenffubhwqmdal.com | |
| ocjsqbqoyjlavan.com | |
| udauindm.com | |
| dwerjnnkpfbmdfeuwby.com | |
| fdijucnvsfvpel.com | |
| waoimlpgtvdsqx.com | |
| hmuhvsjjl.com | |
| vajskiyluwh.com | |
| rntqtgcqnc.com | |
| uvptsjqdvxkjsca.com | |
| xlpmvmcaoppokdcldc.com | |
| lnwdxoqoqxtxxdgs.com | |
| uoctajwdjlqltbf.com | |
| ruvbymubogvlllkyaji.com | |
| uqlmkgtnofmabnpwhj.com | |
| fboymydk.com | |
| musdeyejbcbkse.com | |
| vuhvdkvo.com | |
| pgtbvvjadweh.com | |
| gyaxrikstdwtkai.com | |
| rubyscoeicm.com | |
| aqjwtguuxc.com | |
| fmxkhwlbsvjic.com | |
| pbbvkscdfqmx.com | |
| wodrfdxakskqdurgg.com | |
| yxqcwilaughqrxxhuv.com | |
| bxnopdkka.com | |
| wybypnnefwrnijmr.com | |
| adhymefcryqjfsg.com | |
| ktfejmafpmubmis.com | |
| vhhbenjngfkdqqrxyef.com | |
| pkfrnnsvab.com | |
| ysvsagwfr.com | |
| irypcpym.com | |
| rdxcvejik.com | |
| bnduajijjnyjowost.com | |
| hvkhytpydqm.com | |
| ukpamxcqknbrwtxeon.com | |
| aqyycusxpiyphgqt.com | |
| dajxhcddxoyp.com | |
| ujyprlpoxwwshj.com | |
| jltqngrgikawpnoji.com | |
| ssvducwu.com | |
| picaqhesd.com | |
| rnxlvwchep.com | |
| jkvkigmtstgh.com | |
| vytiwhwdomibkisctq.com | |
| qlpuekmxibf.com | |
| dusxnqcoykl.com | |
| mnnbfmkccrlacrpi.com | |
| eelepdsrwmggiilpaq.com | |
| djtftjakyiqfn.com | |
| tfudlnro.com | |
| rjdirngskatrtg.com | |
| twcdgtvl.com | |
| epwbonwkmcvjunodvf.com | |
| jsrdpgvmu.com | |
| nrfronglu.com | |
| gflyifvtyuarn.com | |
| emwdrbwapescxix.com | |
| pchlbfwusr.com | |
| exjijcjhjlatkplnfol.com | |
| vsmtiytrcacrgcj.com | |
| gswcjhdhgkjnvkent.com | |
| nwynfhre.com | |
| xwbjkvtdmufmf.com | |
| vixqwtroi.com | |
| mmfahqrmftuu.com | |
| ckbytyyandmpgyuojl.com | |
| gfyysdjdftm.com | |
| ptddbyopodpanxbu.com | |
| slkfbshuoru.com | |
| jstxomkn.com | |
| squstnyywumup.com | |
| ddeqsgsws.com | |
| mrtksmcwd.com | |
| rwptujecxf.com | |
| fbbntdkljkvb.com | |
| cwpppiblxarfcmqoym.com | |
| ruiwjxtgflljp.com | |
| hbuqmyrrpoqmybl.com | |
| qhlhsaytjeaorx.com | |
| cugxojvumi.com | |
| wcbpdfpgwffjs.com | |
| vupepgfagso.com | |
| mvtaudrockn.com | |
| hqepovopfoskaf.com | |
| uxvbhdtbhth.com | |
| kegnvjtiowifoavcb.com | |
| epwnqeghafyocr.com | |
| kpsfabxdwbvv.com | |
| andeyvgrdmcuhdmwkd.com | |
| amhqfywanwiip.com | |
| fkdrsgjjroodh.com |
Rootkit activity
The Backdoor installs the following kernel-mode hooks:
ZwCreateKey
ZwOpenKey
Propagation
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Scan a system with an anti-rootkit tool.
- Terminate malicious process(es) (How to End a Process With the Task Manager):
c02f0327c1b5c8c5c1f04b35c6cf77bcmgr.exe:2756
c02f0327c1b5c8c5c1f04b35c6cf77bc.exe:2588
ajvmmkjkbtsibwto.exe:1792 - Delete the original Backdoor file.
- Delete or disinfect the following files created/modified by the Backdoor:
%Documents and Settings%\%current user%\Local Settings\Temp\ajvmmkjkbtsibwto.exe (601 bytes)
%System%\config\software (5764 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%System%\winupdate86mgr.exe (103 bytes)
%System%\winlogon86.exe (601 bytes)
%System%\config\software.LOG (9152 bytes)
%System%\winupdate86.exe (601 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\psyykfdm.sys (15 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"winupdate86.exe" = "%System%\winupdate86.exe" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.